the traces we leave behind
DESCRIPTION
As you most likely are aware of everything you do with a computer system might be logged and tracked in every last minute detail if you or someone else decide to do so. What most users are not aware of though is all the traces and data that you leave behind although none asked for it.This talk will give the audience an insight in the world of invisible surveillance and what kind of tracks we leave behind by merely using a computer system. The audience will also be introduced to how this data can be extracted and how the authorities, the employer or the user can benefit from this. The talk ends with a few examples of how to protect yourself from leaving unwanted traces behind.TRANSCRIPT
![Page 1: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/1.jpg)
The Traces We Leave Behind
AND HOW TO FIND THEM
Mattias Wecksten
2009 (cc) by-nc-sa
![Page 2: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/2.jpg)
What Traces Do You Leave If…
![Page 3: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/3.jpg)
…you delete a file?
![Page 4: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/4.jpg)
…you format a hard drive?
![Page 5: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/5.jpg)
…edits a document without saving?
![Page 6: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/6.jpg)
…use an USB memory?
![Page 7: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/7.jpg)
Files on the Hard Drive
• Hard drive = Binder with index
• Write file = Insert document
• Remove file= Erase from index
• Format = Replace index
![Page 8: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/8.jpg)
Data Extraction: deleted file
• Recreate the entry• Analyze data• Recreate data
![Page 9: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/9.jpg)
Data Extraction: formatted hard drive
• Recreate the register• Analyze data
![Page 10: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/10.jpg)
Data extraction: Word-recovery
![Page 11: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/11.jpg)
The Windows Registry
![Page 12: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/12.jpg)
Metadata
![Page 13: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/13.jpg)
Questionnaire:
• Who is responsible if erased information turns up?• What information seeps out?• What ethical aspects are considered?• Are you prepared for the incident?
![Page 14: The Traces We Leave Behind](https://reader036.vdocuments.us/reader036/viewer/2022062319/555a8d00d8b42abb628b5301/html5/thumbnails/14.jpg)
References
Presentation: M. Weckstén (cc) by-nc-sa
Photo: Bitxo (cc) by-nc-sa
Illustrations: T. Weckstén (cc) by-nc-sa